Collected Postings

2009- Collected Postings, 2007-2008 Collected Postings, 2005-2006 Collected Postings, 2003-2004 Collected Postings, 2001-2002 Collected Postings, 1993-2000 Collected Postings,
Misc. Topic Organization -- Internet History Postings -- Old Email

Usenet Postings by year

2006: p25, p24, p23, p22, p21, p20, p19, p18, p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2005: p22, p21, p20, p19, p18, p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1,
2004: p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1,
2003: p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2 p1
2002: p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2001: p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2000: p7, p6, p5, p4, p3, p2, p1
1999 - 1998 - 1997 - 1996 - 1995 - 1994 - 1993

Current Postings by Subject

Network related postings - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
Mainframe related postings - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
Digital Signature & Standards - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
All postings - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
- home

Network related postings (2005-2006)

"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
1970s data comms (UK)
30 hop limit
3705
54 Processors?
5963 (computer grade dual triode) production dates?
[Clips] Escaping Password Purgatory
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
ALternatives to EMail
AMD to leave x86 behind?
An Out-of-the-Main Activity
An Out-of-the-Main Activity
An Out-of-the-Main Activity
Anyone know whether VM/370 EDGAR is still available anywhere?
ARP routing
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Attacks on IPsec
Authentication - Server Challenge
bandwidth of a swallow (was: Real core)
Barbaras (mini-)rant
Barbaras (mini-)rant
blast from the past, tcp/ip, project athena and kerberos
blast from the past on reliable communication
blast from the past on reliable communication
blast from the past on reliable communication
blast from the past on reliable communication
blast from the past on reliable communication
blast from the past on reliable communication
Callable Wait State
Caller ID "spoofing"
Caller ID "spoofing"
Can anythink kill x86-64?
Canon Cat for Sale
CAS and LL/SC
Cerf and Kahn receive Turing award
Cerf and Kahn receive Turing award
Cerf and Kahn receive Turing award
Changing the Mantra -- RFC 4732 on rethinking DOS
Channel Distances
Channel Distances<
Channel Distances
Code density and performance?
Code density and performance?
Cranky old computers still being used
creat
Cross logins
Cross-Realm Authentication
Curiosity
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
defeating firewalls made easy
Descriptive term for reentrant program that nonetheless is
Development as Configuration
Development as Configuration
Device and channel
Device and channel
Device and channel
DNS Name Caching
DOS/360: Forty years
DUMP Datasets and SMS
DUMP Datasets and SMS
DUMP Datasets and SMS
EBCDIC to 6-bit and back
Effective micropayments
Ethernet, Aloha and CSMA/CD -
Ethernet, Aloha and CSMA/CD -
Ethernet, Aloha and CSMA/CD -
Ethernet, Aloha and CSMA/CD -
Fast action games on System/360+?
Filemode 7-9?
Firefox Lite, Mozilla Lite, Thunderbird Lite -- where to find
General PKI Question
Go-Back-N protocol?
Google Architecture
Google Architecture
HASP/ASP JES/JES2/JES3
He Who Thought He Knew Something About DASD
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
How does the internet really look like?
How many wrongs do you need to make a right?
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM microwave application--early data communications
IBM microwave application--early data communications
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM's mini computers--lack thereof
IBM/Watson autobiography--thoughts on?
Improving Authentication on the Internet
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Internet today -- what's left for hobbiests
Internet today -- what's left for hobbiests
Internet today -- what's left for hobbiests
IPSEC and user vs machine authentication
IPSEC wireless router?
IPSEC with non-domain Server
is a computer like an airport?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is there any RFC for telnet proxy?
Is there a workaround for Thunderbird in a corporate environment?
Is this true? (Were gotos really *that* bad?)
ISA-independent programming language
It's official: "nuke" infected Windows PCs instead of fixing them
link-layer encryptors for Ethernet?
link-layer encryptors for Ethernet?
Linux More Secure on System z?
Listserver for DFSMS/HSM
Lynn at garlic.com
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting (Was: Using Java in batch on
Mainframe Linux Mythbusting
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Materiel and graft
Metcalfe's Law Refuted
Metroliner telephone article
more secure communication over the network
more secure communication over the network
more secure communication over the network
Moz 1.8 performance dramatically improved
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
MVCIN instruction
Need a HOW TO create a client certificate for partner access
Need Help defining an AS400 with an IP address to the mainframe
Network databases
Newsgroups (Was Another OS/390 to z/OS 1.4 migration
Newsgroups (Was Another OS/390 to z/OS 1.4 migration
nntp and ssl
Not Your Dad's Mainframe: Little Iron
NSFNET (long post warning)
Obsolete phrases
Old IBM protocol IBM 1006
OS/2 RIP
OSI - TCP/IP Relationships
OSI model and SSH, TCP, etc
OSI model and an interview
OSI model and an interview
OSI model and an interview
PDP-1
PDP-1
PGP Lame question
practical applications for synchronous and asynchronous communication
Privacy issue - how to spoof/hide IP when accessing email / usenet servers?
Privacy issue - how to spoof/hide IP when accessing email / usenet servers?
Protocol stack - disadvantages (revision)
Protocol stack - disadvantages (revision)
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Query on Load Balancer with SSL
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
real core
Reliable Connections Are Not
Reliable Connections Are Not
Remote Tape drives
Resolver Issue (was Revolver Issue)
RFC 2616 change proposal to increase speed
Secure FTP on the Mainframe
secure payment method
Securing financial transactions a high priority for 2007
Security via hardware?
Self restarting property of RTOS-How it works?
Sending CONSOLE/SYSLOG To Off-Mainframe Server
serious threat models
Single Password - Linux & Windows
Single Password - Linux & Windows
SNA/VTAM for NSFNET
something like a CTC on a PC
something like a CTC on a PC
sorting
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
ssh - password control or key control?
Status of opportunistic encryption
Status of opportunistic encryption
Successful remote AES key extraction
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
TCP channel half closed
tcp-ip concept
tcp-ip concept
TCP/IP and connecting z to alternate platforms
The 8008
The 8008 (was: Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELYwith slide rules)
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The History of Computer Role-Playing Games
the new math: old battle of the sexes was: PDP-1
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Power of the NORC
The System/360 Model 20 Wasn't As Bad As All That
Thou shalt have no other gods before the ANSI C standard
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
Today's mainframe--anything to new?
Token-ring vs Ethernet - 10 years later
Token-ring vs Ethernet - 10 years later
Token-ring vs Ethernet - 10 years later
Top versus bottom posting was Re: IBM sues maker of Intel-based Mainframe clones
Type A ,Type B
Type A ,Type B
UDP and IP Addresses
Using the Cache to Change the Width of Memory
Using the Cache to Change the Width of Memory
Using the Cache to Change the Width of Memory
Using the Cache to Change the Width of Memory
VM SPOOL question
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
waiting for acknowledgements
waiting for acknowledgements
waiting for acknowledgements
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
What are the latest topic in TCP/IP
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What is the "name" of a system?
What's a mainframe?
what's the difference between LF(Line Fee) and NL (New line)?
Where should the type information be: in tags and descriptors
Which entry of the routing table was selected?
Why I use a Mac, anno 2006
Why I use a Mac, anno 2006
Why I use a Mac, anno 2006
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why these original FORTRAN quirks?
winscape?
Worried about your online privacy?
Would multi-core replace SMPs?
X.509 and ssh
XBOX 360
z/VM Listserv?
z/VM Listserv?

back to top, network - (2003-2004), - (2001-2002), - (1993-2000), mainframe, digsig, all

Mainframe related postings (2005-2006)

"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
32 or even 64 registers for x86-64?
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
5692 and 6SN7 vs 5963's for computer use
5692 and 6SN7 vs 5963's for computer use
5692 and 6SN7 vs 5963's for computer use
A Day For Surprises (Astounding Itanium Tricks)
A Day For Surprises (Astounding Itanium Tricks)
An Out-of-the-Main Activity
An Out-of-the-Main Activity
Another BIG Mainframe Bites the Dust
Another BIG Mainframe Bites the Dust
Any resources on VLIW?
Any resources on VLIW?
Any resources on VLIW?
AOS: The next big thing in data storage
Are hypervisors the new foundation for system software?
Article on Painted Post, NY
Assembler question
Assembler question
Assembler question
Assembler question
bandwidth of a swallow (was: Real core)
Cache, TLB and OS
Cache, TLB and OS
CMSBACK
CPU usage for paging
CRAM, DataCell, and 3850
CRAM, DataCell, and 3850
CRAM, DataCell, and 3850
Curiousity: CPU % for COBOL program
DASD Response Time (on antique 3390?)
DCSS
DCSS
DCSS
dcss and page mapped filesystem
Decimal FP
Decimal FP
Descriptive term for reentrant program that nonetheless is
Design life of S/360 components?
Draft Command Script Processing Manual
Executing both branches in advance?
garlic.com
Generalised approach to storing address details
Google Architecture
Google launches search engine for finding source code
Gould, not Harris
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software, System R
Greatest Software, System R
Greatest Software?
hardware virtualization slower than software?
History of IBM Systems
History: How did Forth get its stacks?
How Many 360/195s and 370/195s were shipped?
How Many 360/195s and 370/195s were shipped?
IA64 and emulator performance
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IDC: Virtual machines taking over the world
Improving 360 Addressing
Intel abandons USEnet news
intersection between autolog command and cmsback (more history)
Is no one reading the article?
Is no one reading the article?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is this true? (Were gotos really *that* bad?)
Languages that should have made it but didn't
Large Computer Rescue
Large Computer Rescue
Linux - Our Saving Grace?
Linux mainframe game machine
Linux More Secure on System z?
long ago and far away, vm370 from early/mid 70s
long ago and far away, vm370 from early/mid 70s
Mainframe Limericks
Mainframe Limericks
Mainframe Limericks
Mainframe Limericks
Mainframe Limericks
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting (Was: Using Java in batch on
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting
Mainframe Linux Mythbusting
Materiel and graft
Materiel and graft
Materiel and graft
MB to Cyl Conversion
MB to Cyl Conversion
memory, 360 lcs, 3090 expanded store, etc
Metroliner telephone article
MIPS architecture question - Supervisor mode & who is using it?
more secure communication over the network
more secure communication over the network
more than 16mbyte support for 370
moving on
moving on
moving on
moving on
MTS, Emacs, and... WYLBUR?
MTS, Emacs, and... WYLBUR?
Multics on Vmware?
Multiple mappings
Multiple mappings
Multiple mappings
Multiple mappings
Multiple mappings
Multiple mappings
Musings on a holiday weekend
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
old Gold/UTS reference
Old Hashing Routine
Old Hashing Routine
Old Hashing Routine
old hypervisor email
Old IBM protocol IBM 1006
old vm370 mitre benchmark
On the 370/165 and the 360/85
One or two CPUs - the pros & cons
oops
oops, cics
OT - J B Hunt
P390
Pa Tpk spends $30 million for "Duet" system; but benefits are unknown
Paranoia..Paranoia..Am I on the right track?.. any help please?
Patent #6886160
RAMAC 305(?)
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
RCA Spectra 70/25: Another Mystery Computer?
real core
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
Reasons for the big paradigm switch
Remote Tape drives
S0C1 with ILC 6
S0C1 with ILC 6
SHA-1 code for IBM Mainframe
SHARE attendance
SNA/VTAM for NSFNET
sorting
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
Source maintenance was Re: SEQUENCE NUMBERS
Source maintenance was Re: SEQUENCE NUMBERS
Source maintenance was Re: SEQUENCE NUMBERS
Storage Philosophy Question
Storage Philosophy Question
Strobe equivalents
TCP/IP and connecting z to alternate platforms
Tek 4010, info and prices
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The History of Computer Role-Playing Games
the more things change, the more things stay the same
the more things change, the more things stay the same
the more things change, the more things stay the same
The not-so-little shop of 747s
THE on USS?
The Question of Braces in APL-ASCII
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The very first text editor
The very first text editor
The very first text editor
The very first text editor
The very first text editor
threads versus task
threads versus task
threads versus task
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
Top versus bottom posting was Re: IBM sues maker of Intel-based Mainframe clones
Top versus bottom posting was Re: IBM sues maker of Intel-based Mainframe clones
Track capacity?
Track capacity?
Track capacity?
Trying to design low level hard disk manipulation program
Trying to design low level hard disk manipulation program
Trying to design low level hard disk manipulation program
Using different storage key's
VAXen with switchmode power supplies?
Very slow booting and running and brain-dead OS's?
Very slow booting and running and brain-dead OS's?
Very slow booting and running and brain-dead OS's?
Very slow booting and running and brain-dead OS's?
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
VM SPOOL question
VM SPOOL question
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
waiting for acknowledgements
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
What part of z/OS is the OS?
What part of z/OS is the OS?
What part of z/OS is the OS?
What part of z/OS is the OS?
What part of z/OS is the OS?
What's a mainframe?
What's a mainframe?
What's a mainframe?
What's a mainframe?
What's a mainframe?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
When Does Folklore Begin???
When Does Folklore Begin???
When Does Folklore Begin???
When Does Folklore Begin???
Where can you get a Minor in Mainframe?
Where can you get a Minor in Mainframe?
Where can you get a Minor in Mainframe?
Where can you get a Minor in Mainframe?
Why Did No Core Machines Have Cache???
Why Didn't The Cent Sign or the Exclamation Mark Print?
Why Didn't The Cent Sign or the Exclamation Mark Print?
Why is zSeries so CPU poor?
Why is z series so CPU poor?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why no double wide compare and swap on Sparc?
Why no double wide compare and swap on Sparc?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?; Now : Programming practices
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Z/Os Storage Mgmt products
"Best practices" or "Best implementations"?
"VAX" Tradename reused !
11may76, 30 years, (re-)release of resource manager
12-2-9 REP & 47F0
1401-S, 1470 "last gasp" computers?
1403 printers
1403 printers
1403 printers
1970s data comms (UK)
25% Pageds utilization on 3390-09?
2nd level install - duplicate volsers
2nd level install - duplicate volsers
30 Years and still counting
3380-3390 Conversion - DISAPPOINTMENT
3390-81
360 DIAGNOSE
360 longevity, was RISCs too close to hardware?
360POO
3705
3705 ID Tag
4shift schedule
4th April, 1984
54 Processors?
54 Processors?
54 Processors?
8086 memory space
8086 memory space
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[newbie] Ancient version of Unix under vm/370
[newbie] Ancient version of Unix under vm/370
[OT?] FBI Virtual Case File is even possible?
A second look at memory access alignment
A second look at memory access alignment
A second look at memory access alignment
A second look at memory access alignment
A second look at memory access alignment
A second look at memory access alignment
A very basic question
A very basic question
A very basic question
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
address space
address space
address space
Adversarial Testing, was Re: Thou shalt have no
Adversarial Testing, was Re: Thou shalt have no
Adversarial Testing, was Re: Thou shalt have no
All Good Things
AMD to leave x86 behind?
AMD to leave x86 behind?
Amusing acronym
Amusing acronym
Amusing acronym
Ancient history
Another - Another One Bites the Dust
another blast from the past
another blast from the past ... vamps
Another entry in the internet security hall of shame
Anyone know whether VM/370 EDGAR is still available anywhere?
Anyone know whether VM/370 EDGAR is still available anywhere?
APL, J or K?
Arpa address
Arpa address
Article in Information week: Mainframe Programmers Wanted
Article: The True Value of Mainframe Security
Article: The True Value of Mainframe Security
Article: The True Value of Mainframe Security
Article: The True Value of Mainframe Security
auto reIPL
auto reIPL
Average Seek times are pretty confusing
Average Seek times are pretty confusing
backup/archive
Barbaras (mini-)rant
Barbaras (mini-)rant
Behavior in undefined areas?
Best practice for TOD clock
Binder REP Cards (Was: What's the linkage editor really wants?)
Binder REP Cards (Was: What's the linkage editor really wants?)
Binder REP Cards
Binder REP Cards (Was: What's the linkage editor really wants?)
Binder REP Cards
blast from the past ... macrocode<
Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELY
Blowing My Own Horn
Book on computer architecture for beginners
Book on computer architecture for beginners
Book on computer architecture for beginners
Book on computer architecture for beginners
Book on computer architecture for beginners
Callable Wait State
capacity of largest drive
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
CAS and LL/SC
Cerf and Kahn receive Turing award
Cerf and Kahn receive Turing award
Change in computers as a hobbiest
Change in computers as a hobbiest
Change in computers as a hobbiest
Change in computers as a hobbiest
Channel Distances
Channel Distances
Channel Distances
Channel Distances
Channel Distances
Charging Time
Charging Time
Clearing sensitive in-memory data in perl
Cluster computing drawbacks
Cluster computing drawbacks
Cluster computing drawbacks
Cluster computing drawbacks
clusters vs shared-memory (was: Re: CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE))
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Collins C-8401 computer?
Command reference for VM/370 CMS Editor
Command reference for VM/370 CMS Editor
Communications Computers - Data communications over telegraph
comp.arch thread "intel's vanderpool and virtualization in general" ,,, fyi
Convering 2 Bytes of binary to BCD
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
CPU time and system load
Crash detection by OS
CRJE and CRBE
Dangerous Hardware
DASD Response Time (on antique 3390?)
Data communications over telegraph circuits
Data communications over telegraph circuits
dbdebunk 'Quote of Week' comment
DCSS as SWAP disk for z/Linux
DCSS as SWAP disk for z/Linux
DCSS as SWAP disk for z/Linux
DCSS as SWAP disk for z/Linux
DCSS as SWAP disk for z/Linux
DDJ Article on "Secure" Dongle
Description of a new old-fashioned programming language
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Device and channel
Device and channel
Device and channel
Device and channel
Device and channel
DMV systems?
DMV systems?
DMV systems?
Documentation for the New Instructions for the z9 Processor
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
Dual Core CPUs are slower than Dual Single core CPUs??
DUMP Datasets and SMS
DUMP Datasets and SMS
DUMP Datasets and SMS
Early microcomputer (esp i8008) software
EBCDIC to 6-bit and back
EBCDIC to 6-bit and back
EREP , sense ... manual
EREP , sense ... manual
ESCON to FICON conversion
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Expanded Storage
Expanded Storage
Expanded Storage
Expanded Storage
Expanded Storage
Fast action games on System/360+?
Fast action games on System/360+?
Fast action games on System/360+?
Fast action games on System/360+?
Fast action games on System/360+?
File path formats
Filemode 7-9?
Filemode 7-9?
Filemode 7-9?
Filemode 7-9?
First assembly language encounters--how to get started?
Flat Query
Flat Query
Flat Query
Foreign key in Oracle Sql
Foreign key in Oracle Sql
Foreign key in Oracle Sql
Free to good home: IBM RT UNIX
Friday question: How far back is PLO instruction supported?
Friday question: How far back is PLO instruction supported?
FULIST
FULIST
FULIST
FULIST
FULIST
FULIST
FULIST
FULIST
FULIST
Good System Architecture Sites?
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Graphics on the IBM 2260?
Hadware Support for Protection Bits: what does it really mean?
Hadware Support for Protection Bits: what does it really mean?
hasp, jes, rasp, aspen, gold
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
Hercules 3.04 announcement
Hercules 3.04 announcement
Hercules 3.04 announcement
Hercules 3.04 announcement
Higher Education places still use mainframes?
History of performance counters
History of performance counters
History of first use of all-computerized typesetting?
How do you say "gnus"?
How do you get the chain of certificates & public keys securely
How does this make you feel?
How much RAM is 64K (36-bit) words of Core Memory?
How much RAM is 64K (36-bit) words of Core Memory?
How to restore VMFPLC dumped files on z/VM V5.1
How to restore VMFPLC dumped files on z/VM V5.1
How to restore VMFPLC dumped files on z/VM V5.1
How to implement Lpars within Linux
How to implement Lpars within Linux
IBM 1130
IBM 3090/VM Humor
IBM 3090/VM Humor
IBM 3090/VM Humor
IBM 3330
IBM 3330
IBM 3380 and 3880 maintenance docs needed
IBM 360 channel assignments
IBM 360 channel assignments
IBM 360 channel assignments
IBM 5100 luggable computer with APL
IBM 5100 luggable computer with APL
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM Acronyms
IBM microwave application--early data communications
IBM microwave application--early data communications
IBM Password fun
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM up for grabs?
IBM up for grabs?
IBM up for grabs?
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's POWER6
IBM, UNIVAC/SPERRY, BURROUGHS, and friends. Compare?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IEH/IEB/... names?
IEH/IEB/... names?
IEH/IEB/... names?
Implementing schedulers in processor????
increasing addressable memory via paged memory?
increasing addressable memory via paged memory?
Instruction Set Enhancement Idea
Intel engineer discusses their dual-core design
Intel engineer discusses their dual-core design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel vPro Technology
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general (was Re: Cell press release, redacted.)
intel's Vanderpool and virtualization in general (was Re: Cell press release, redacted.)
Interesting P4 pipeline article ("replay")
Internet today -- what's left for hobbiests
IPCS Standard Print Service
Is a Hurricane about to hit IBM?
Is a Hurricane about to hit IBM?
Is the solution FBA was Re: FW: Looking for Disk Calc
Is VIO mandatory?
Is VIO mandatory?
Is VIO mandatory?
ISA vs. patent/trademark
ISA-independent programming language
ISA-independent programming language
It's official: "nuke" infected Windows PCs instead of fixing them
Jack Kilby dead
JES unification project
Job seperators
Latest news about mainframe
Latest news about mainframe
Listserver for DFSMS/HSM
looking to buy a working DX box
Loss Expectancy in NPV calculations
M.I.T. SNA study team
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Jobs Going Away
Mainframe Jobs Going Away
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting (Was: Using Java in batch
Mainframe near history (IBM 3380 and 3880 docs)
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Making History
Massive i/o
Massive i/o
Massive i/o
MCTS
MCTS
MCTS
Meccano Trojans coming to a desktop near you
Military Time?
Military Time?
Military Time?
Military Time?
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
More on garbage collection
More on garbage collection
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
Mount a tape
Mount a tape
Mount DASD as read-only
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Multicores
Multicores
Multicores
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVS secure configuration standard
MVS secure configuration standard
MVS secure configuration standard
NASA Discovers Space Spies From the 60's
Need Help defining an AS400 with an IP address to the mainframe
Network databases
new Enterprise Architecture online user group
Newsgroups (Was Another OS/390 to z/OS 1.4 migration
non ECC
Non Power of 2 Cache Sizes
Not enough parallelism in programming
Numa-Q Information
Old Computers and Moisture don't mix - fairly OT
Old Computers and Moisture don't mix - fairly OT
Old Computers and Moisture don't mix - fairly OT
Old Computers and Moisture don't mix - fairly OT
Old PCs--environmental hazard
Old PCs--environmental hazard
Old PCs--environmental hazard
Old PCs--environmental hazard
Oldest active information system
One more about SYRES Sharing
One or two CPUs - the pros & cons
One or two CPUs - the pros & cons
OS's with loadable filesystem support?
OS/2 RIP
OSI model and an interview
other cp/cms history
Over my head in a JES exit
Over my head in a JES exit
Over my head in a JES exit
Over my head in a JES exit
Over my head in a JES exit
Over my head in a JES exit
Page fault question (zero-filling)
PART 3. Why it seems difficult to make an OOO VAX competitive
Password Requirements - VM:Secure
Password Requirements - VM:Secure
Passwords
PCI audit compliance
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDS Directory Question
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance of zOS guest
Power5 and Cell, new issue of IBM Journal of R&D
POWER6 on zSeries?
POWER6 on zSeries?
POWER6 on zSeries?
POWER6 on zSeries?
Program execution speed
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
PVM protocol documentation found
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Question about Dungeon game on the PDP
Radical z/OS
Random Access Tape?
Really BIG disk platters?
Regarding interrupt sharing architectures!
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
rexx or other macro processor on z/os?
Robert Creasy, RIP
RSA SecurID product
RSA SecurID product
RSA SecurID product
S/360
Secure design
Secure design
Secure FTP on the Mainframe
Security via hardware?
Security via hardware?
Seeking Info on XDS Sigma 7 APL
Seeking Info on XDS Sigma 7 APL
Seeking Info on XDS Sigma 7 APL
Seeking Info on XDS Sigma 7 APL
Seeking Info on XDS Sigma 7 APL
Self restarting property of RTOS-How it works?
SHARE 50 years
SHARE 50 years?
SHARE reflections
simd for 390(or z990)?
simple-minded historical "mips"
simple-minded historical "mips"
Single System Image questions
Single System Image questions
Single System Image questions
Software for IBM 360/30
Software for IBM 360/30
Software for IBM 360/30 (was Re: DOS/360: Forty years)
Software for IBM 360/30
Software for IBM 360/30
Software for IBM 360/30
Software for IBM 360/30
Some credible documented evidence that a MVS or later op sys has ever been hacked
Some thoughts on high-assurance certificates
some walk down history lane
something like a CTC on a PC
something like a CTC on a PC
something like a CTC on a PC
something like a CTC on a PC
something like a CTC on a PC
Sprint backs out of IBM outsourcing deal
Statistics on program constant sizes?
Status of Software Reuse?
Stop Me If You've Heard This One Before
Stop Me If You've Heard This One Before
storage key question
stranger than fiction
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
Tapes (3590) and VM
Tax chooses dead language - Austalia
Tax chooses dead language - Austalia
terminals was: Caller ID "spoofing"
The future of the Mainframe
The Mainframe and its future.. or furniture
The Mainframe and its future.. or furniture
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The rise of the virtual machines
The Soul of Barb's New Machine
The Soul of Barb's New Machine (was Re: creat)
The Soul of Barb's New Machine (was Re: creat)
The Soul of Barb's New Machine (was Re: creat)
The very first text editor
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Title screen for HLA Adventure? Need help designing one
TLAs - was summit else entirely
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD clock discussion
TOD clock discussion
Today's mainframe--anything to new?
Today's mainframe--anything to new?
Today's mainframe--anything to new?
Today's mainframe--anything to new?
Token-ring vs Ethernet - 10 years later
Token-ring vs Ethernet - 10 years later
transputers again was: The demise of Commodore
TSO and more was: PDP-1
TSO replacement?
TSO replacement?
TSO replacement?
UMA vs SMP? Clarification of terminology
UMA vs SMP? Clarification of terminology
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s<
Using the Cache to Change the Width of Memory
Using the Cache to Change the Width of Memory
Various kinds of System reloads
Various kinds of System reloads
Various kinds of System reloads
virtual 360/67 support in cp67
virtual 360/67 support in cp67
virtual 360/67 support in cp67
virtual 360/67 support in cp67
Virtual Machine Hardware
Virtual Machine Hardware
Virtual Machine Hardware
Virtual Machine Hardware
Virtual memory and memory protection
virtual memory
Virtual memory implementation in S/370
Virtual memory implementation in S/370
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
Virtual Virtualizers
Virtual Virtualizers
Virtual Virtualizers
VM maclib reference
VM tape definitions
VMFPLC2 to load EREP PTFs
Volume Largest Free Space Problem...???
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What happens if CR's are directly changed?
What is CRJE
What is written on the keys of an ICL Hand Card Punch?
What was new&important in computer architecture 10 years ago?
wheeler scheduler and hpo
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be?
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be?
Where should the type information be?
Where should the type information be?
who invented CONFIG/SYS?
Why? (Was: US Military Dead during Iraq War
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
Would multi-core replace SMPs?
Would multi-core replace SMPs?
X.509 and ssh
You might be a mainframer if... :-) V3.8
z/VM performance
Zeroing core

back to top, network, mainframe - (2003-2004), - (2001-2002), - (1993-2000), digsig, all

Digital Signature & Standards (2005-2006)

"doing the CA statement shuffle" and other dances
"The Elements of Programming Style"
A glimpse of SIGINT 20 years ago
A note on vendor reaction speed to the e=3 problem
ABN Tape - Found
Actual difference between RSA public and private keys?
AMD to leave x86 behind?
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Basic Question
Beginner's Pubkey Crypto Question
Benefits of PKI - 5,000 nodes organization
Broken SSL domain name trust model
Broken SSL domain name trust model
Broken SSL domain name trust model
browser vendors and CAs agreeing on high-assurance certificates
browser vendors and CAs agreeing on high-assurance certificates
browser vendors and CAs agreeing on high-assurance certificates
Caller ID "spoofing"
Caller ID "spoofing"
Caller ID "spoofing"
Case Study: Thunderbird's brittle security as proof of Iang's 3rd Hypothesis in secure design: there is only one mode, and it's secure
Case Study: Thunderbird's brittle security as proof of Iang's 3rd Hypothesis in secure design: there is only one mode, and it's secure
confidence in CA
confidence in CA
confidence in CA
Contactless payments and the security challenges
continuity of identity
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
Digital Singatures question
Does Public Key Authentication offer additional security over SSH/SFTP
Does Public Key Authentication offer additional security over SSH/SFTP
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)
Encryption and authentication
Extended Validation - setting the minimum liability, the CA trap, the market in browser governance
famous literature
feasibility of certificate based login (PKI) w/o real smart card
Fighting Fraudulent Transactions
Flaw exploited in RFID-enabled passports
FraudWatch - Chip&Pin, a new tenner (USD10)
Gen 2 EPC Protocol Approved as ISO 18000-6C
Gen 2 EPC Protocol Approved as ISO 18000-6C
Gen 2 EPC Protocol Approved as ISO 18000-6C
GP4.3 - Growth and Fraud - Case #3 - Phishing
GP4.3 - Growth and Fraud - Case #3 - Phishing
GP4.3 - Growth and Fraud - Case #3 - Phishing
GP4.3 - Growth and Fraud - Case #3 - Phishing
GP4.3 - Growth and Fraud - Case #3 - Phishing
Greatest Software Ever Written?
Hamiltonian path as protection against DOS
Hey! Keep Your Hands Out Of My Abstraction Layer!
History and definition of the term 'principal'?
how password is stored and check the authentication??
IBM microwave application--early data communications
Identity and Access Management (IAM)
Identity v. anonymity -- that is not the question
IPSEC wireless router?
IPSEC with non-domain Server
Is Mondex secure?
Is there any future for smartcards?
It's official! SSH whips HTTPS butt! (in small minor test of no import....)
JIBC April 2006 - "Security Revisionism"
Kama Sutra Spoofs Digital Certificates
Logon with Digital Siganture (PKI/OCES - or what else they're called)
long-term GPG signing key
long-term GPG signing key
long-term GPG signing key
Major Browsers and CAS announce balkanisation of Internet Security
Meccano Trojans coming to a desktop near you
more secure communication over the network
more secure communication over the network
more secure communication over the network
Multi-layered PKI implementation
Multics on Vmware?
Naked Payments IV - let's all go naked
Naked Payments IV - let's all go naked
New ISO standard aims to ensure the security of financial transactions on the Internet
NEW USA FFIES Guidance
News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
On-card displays
OpenSSL Hacks
P2P Authentication
Patent buster for a method that increases password security
Payment Tokens
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
phishing web sites using self-signed certs
phishing web sites using self-signed certs
phishing web sites using self-signed certs
phishing web sites using self-signed certs
PKI
PKI
PKI Certificate question
PKI too confusing to prevent phishing, part 28
Root CA CRLs
RSA SecurID product
RSA SecurID product
RSA SecurID product
RSA SecurID product
RSA SecurID product
RSA SecurID SID800 Token vulnerable by design
secure payment method
Secure web page?
Securing financial transactions a high priority for 2007
Securing Private Key
Security Soap Opera - (Central) banks don't (want to) know, MS prefers Brand X, airlines selling your identity, first transaction trojan
Separation of Roles - an example
Shifting the Burden - legal tactics from the contracts world
signing all outbound email
simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
Smartcard reader with certificate inside the reader
Smartcard reader with certificate inside the reader
Smartcard reader with certificate inside the reader
Some thoughts on high-assurance certificates
Some thoughts on high-assurance certificates
SSL Certificate Signing
SSL security with server certificate compromised
SSL, Apache 2 and RSA key sizes
SSL, Apache 2 and RSA key sizes
Status of opportunistic encryption
Status of opportunistic encryption
Status of SRP
Status of opportunistic encryption
Status of opportunistic encryption
Status of SRP
TCPA compatible smarcard readers?
The new High Assurance SSL Certificates
The new High Assurance SSL Certificates
The Pankian Metaphor
Threatwatch - 2-factor tokens attacked by phishers
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TPM & disk crypto
trusted certificates and trusted repositories
trusted certificates and trusted repositories
trusted repositories and trusted transactions
TTP and KCM
TTP and KCM
Use of TPM chip for RNG?
What does a patent do that copyright does not?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What is the point of encrypting information that is publicly visible?
whats the difference between Encryption and Encoding? or both are same?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
where do I buy a SSL certificate?
where do I buy a SSL certificate?
Why not 2048 or 4096 bit RSA key issuance?
Why not 2048 or 4096 bit RSA key issuance?
Why not 2048 or 4096 bit RSA key issuance?
Why not 2048 or 4096 bit RSA key issuance?
Why not 2048 or 4096 bit RSA key issuance?
winscape?
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
Your data private? Access all areas is on the cards
"Best practices" or "Best implementations"?
"SSL stops credit card sniffing" is a correlation/causality myth
two-factor authentication problems
two-factor authentication problems
[Clips] Does Phil Zimmermann need a clue on VoIP?
[Lit.] Buffer overruns
A cool demo of how to spoof sites (also shows how TrustBar preventsthis...)
Actual difference between RSA public and private keys?
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Attacks on IPsec
Authentication - Server Challenge
Barcode Email
Barcode Email
Brit banks introduce delays on interbank xfers due to phishing boom
Catch22. If you cannot legally be forced to sign a document etc - Tax Declaration etc etc etc
Certificate Authority of a secured P2P network
Certificate Authority of a secured P2P network
Certificate Management Tools
Certificate Services
Citibank discloses private information to improve security
Citibank discloses private information to improve security
couple more Q's on basic public key encryption techniques
Course 2821; how this will help for CISSP exam?
Creating certs for others (without their private keys)
Creating certs for others (without their private keys)
Dealing with warning that certifcate can't be trusted?
Determinstic OpenSSL signature
Digital ID
Digital signature with Javascript
Digital signature with Javascript
Digital signature with Javascript
Digital signature with Javascript
Digital signatures have a big problem with meaning
Digital signatures have a big problem with meaning
Digital signatures have a big problem with meaning
Do I need a certificat?
Do I need a certificat?
Do You Need a Digital ID?
Do You Need a Digital ID?
Do You Need a Digital ID?
Do You Need a Digital ID?
Do You Need a Digital ID?
Do You Need a Digital ID?
Encryption Everywhere? (Was: Re: Ho boy! Another big one!)
EuroPKI 2005 - Call for Participation
EuroPKI 2005 - Call for Participation
General PKI Question
GeoTrust says existing PKI practices are worthless
Globus/GSI versus Kerberos
how do i encrypt outgoing email
How many wrongs do you need to make a right?
How many wrongs do you need to make a right?
How much for a DoD X.509 certificate?
How much for a DoD X.509 certificate?
ID "theft" -- so what?
ID "theft" -- so what?
Importing CA certificate to smartcard
Improving Authentication on the Internet
Improving Authentication on the Internet
Improving Authentication on the Internet
Improving Authentication on the Internet
Improving Authentication on the Internet
Innovative password security
Innovative password security
IPSEC and user vs machine authentication
Is a cryptographic monoculture hurting us all?
Is symmetric key distribution equivalent to symmetric key generation?
Is symmetric key distribution equivalent to symmetric key generation?
JIE - Contracts in Cyberspace
Keeping an eye on ATM fraud
Key pair & Certificate lifetimes
Key pair & Certificate lifetimes
keysigning: identity checks
Loss Expectancy in NPV calculations
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
MD5 collision in X509 certificates
MD5 collision in X509 certificates
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
Need a HOW TO create a client certificate for partner access
NEW USA FFIES Guidance
Noobie SSL certificate problem
payment system fraud, etc
PKI Crypto and VSAM RLS
PKI News
PKI News
PKI News
PKI: the end
PKI: the end
PKI: the end
PKI: the end
PKI: the end
private key encryption - doubts
private key encryption - doubts
Protocol stack - disadvantages (revision)
public key authentication
public key authentication
Public/Private key pair protection on Windows
Qualified Certificate Request
Query on Load Balancer with SSL
Question about authentication protocols
Repository for digital certificates
Revoking the Root
Revoking the Root
S/MIME Certificates from External CA
Signing and bundling data using certificates
simple question about certificate chains
single-signon with X.509 certificates
Smart cards and use the private key
Smart Cards?
Some questions on smart cards (Software licensing using smart cards)
The Chinese MD5 attack
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
The summer of PKI love
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
To live in interesting times - open Identity systems
UK EU presidency aims for Europe-wide biometric ID card
Uploading to Asimov
Using Corporate Logos to Beat ID Theft
What happened with the session fixation bug?
What happened with the session fixation bug?
What is a Certificate?
What is a Certificate?
What is a Certificate?
What is a Certificate?
What is a Certificate?
What is a Certificate?
Which certification authority to use
Wildcard SSL Certificates
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X509 digital certificate for offline solution
XML Encryption
xml-security vs. native security
xml-security vs. native security
xml-security vs. native security
xml-security vs. native security
xml-security vs. native security

back to top, network, mainframe, digsig - (2003-2004), - (2001-2002), - (1993-2000), all

Current Collected subjects (2005-2006)

"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"25th Anniversary of the Personal Computer"
"Best practices" or "Best implementations"?
"Best practices" or "Best implementations"?
"Best practices" or "Best implementations"?
"doing the CA statement shuffle" and other dances
"doing the CA statement shuffle" and other dances
"SSL stops credit card sniffing" is a correlation/causality myth
"SSL stops credit card sniffing" is a correlation/causality myth
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"VAX" Tradename reused !
'Innovation' and other crimes
'Innovation' and other crimes
'Innovation' and other crimes
'Virtual Card' Offers Online Security Blanket
(at least smp) fc5 kernels after 1788 have excessive kernel overhead
1.8b2 / 1.7.11 tab performance
11may76, 30 years, (re-)release of resource manager
12-2-9 REP & 47F0
1401-S, 1470 "last gasp" computers?
1403 printers
1403 printers
1403 printers
1403 printers
19,000 Accounts Compromised
1960s railroad data processing on L&N
1970s data comms (UK)
21st century pyramids--super datacenters
25% Pageds utilization on 3390-09?
2nd level install - duplicate volsers
2nd level install - duplicate volsers
3 of the big 4 - all doing payment systems
3 of the big 4 - all doing payment systems
3 of the big 4 - all doing payment systems
3 of the big 4 - all doing payment systems
3 value logic. Why is SQL so special?
3 value logic. Why is SQL so special?
3 value logic. Why is SQL so special?
30 hop limit
30 Years and still counting
32 or even 64 registers for x86-64?
32 or even 64 registers for x86-64?
32 or even 64 registers for x86-64?
3380-3390 Conversion - DISAPPOINTMENT
3390-81
360 DIAGNOSE
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360POO
3705
3705 ID Tag
3vl 2vl and NULL
3vl 2vl and NULL
4shift schedule
4th April, 1984
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
50th Anniversary of invention of disk drives
54 Processors?
54 Processors?
54 Processors?
5692 and 6SN7 vs 5963's for computer use
5692 and 6SN7 vs 5963's for computer use
5692 and 6SN7 vs 5963's for computer use
5963 (computer grade dual triode) production dates?
64-bit architectures & 32-bit instructions
64-bit architectures & 32-bit instructions
8086 memory space [was: The Soul of Barb's New Machine]
8086 memory space
8086 memory space
8086 memory space
8086 memory space
8086 memory space
8086 memory space
8086 memory space
two-factor authentication problems
two-factor authentication problems
[Clips] Banks Seek Better Online-Security Tools
[Clips] Contactless payments and the security challenges
[Clips] Does Phil Zimmermann need a clue on VoIP?
[Clips] Does Phil Zimmermann need a clue on VoIP?
[Clips] Escaping Password Purgatory
[Clips] Paying Extra for Faster Airport Security
[Clips] Paying Extra for Faster Airport Security
[Lit.] Buffer overruns
[Lit.] Buffer overruns<
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[newbie] Ancient version of Unix under vm/370
[newbie] Ancient version of Unix under vm/370
[OT?] FBI Virtual Case File is even possible?
[OT?] FBI Virtual Case File is even possible?
[OT?] FBI Virtual Case File is even possible?
A cool demo of how to spoof sites (also shows how TrustBar preventsthis...)
A Day For Surprises (Astounding Itanium Tricks)
A Day For Surprises (Astounding Itanium Tricks)
A Day For Surprises (Astounding Itanium Tricks)
A glimpse of SIGINT 20 years ago
A good argument for XML
A Historical Look at the VAX
A note on vendor reaction speed to the e=3 problem
A second look at memory access alignment
A second look at memory access alignment
A second look at memory access alignment
A second look at memory access alignment
A second look at memory access alignment
A second look at memory access alignment
A very basic question
A very basic question
A very basic question
ABN Tape - Found
ABN Tape - Found
ABN Tape - Found
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
About TLB in lower-level caches
Academic priorities
Actual difference between RSA public and private keys?
address space
address space
address space
Admired designs / designs to study
Admired designs / designs to study
Admired designs / designs to study
Admired designs / designs to study
Adversarial Testing, was Re: Thou shalt have no
Adversarial Testing, was Re: Thou shalt have no
Adversarial Testing, was Re: Thou shalt have no
Adversarial Testing, was Re: Thou shalt have no
All Good Things
ALternatives to EMail
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
AMD to leave x86 behind?
Amusing acronym
Amusing acronym
Amusing acronym
Amusing acronym
An Out-of-the-Main Activity
An Out-of-the-Main Activity
An Out-of-the-Main Activity
An Out-of-the-Main Activity
Ancient history
Ancient history
Ancient history
Ancient history
Ancient history
And another cloning tale
Another - Another One Bites the Dust
Another BIG Mainframe Bites the Dust
Another BIG Mainframe Bites the Dust
another blast from the past
another blast from the past ... vamps
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Another entry in the internet security hall of shame
Any resources on VLIW?
Any resources on VLIW?
Any resources on VLIW?
Anyone know what the 'clipper' chip looks like?
Anyone know whether VM/370 EDGAR is still available anywhere?
Anyone know whether VM/370 EDGAR is still available anywhere?
Anyone remember Mohawk Data Science?
AOS: The next big thing in data storage
AOS: The next big thing in data storage
APL, J or K?
Apple to help Microsoft with "security neutrality"?
Apple to help Microsoft with "security neutrality"?
Architectural support for programming languages
Are hypervisors the new foundation for system software?
Are there more stupid people in IT than there used to be?
Are there more stupid people in IT than there used to be?
Are there more stupid people in IT than there used to be?
Are there more stupid people in IT than there used to be?
Are there more stupid people in IT than there used to be?
Are there more stupid people in IT than there used to be?
ARP routing
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Arpa address
Article in Information week: Mainframe Programmers Wanted
Article on Painted Post, NY
Article on Painted Post, NY
Article on Painted Post, NY
Article on Painted Post, NY
Article: The True Value of Mainframe Security
Article: The True Value of Mainframe Security
Article: The True Value of Mainframe Security
Article: The True Value of Mainframe Security
Assembler question
Assembler question
Assembler question
Assembler question
AT&T Labs vs. Google Labs - R&D History
Athlon cache question
Athlon cache question
ATM machine security
ATMs hacked using MP3 player
Attacks on IPsec
Audit Follies - Atlantic differences, branding UnTrust, thunbs on Sarbanes-Oxley, alternates
Audit Follies - Atlantic differences, branding UnTrust, thunbs on Sarbanes-Oxley, alternates
Authentication - Server Challenge
auto industry
auto reIPL
auto reIPL
Average Seek times are pretty confusing
Average Seek times are pretty confusing
Average Seek times are pretty confusing
backup/archive
bandwidth of a swallow (was: Real core)
Bank of America - On Line Banking *NOT* Secure?
Banks
Banks
Banks
Banks Test ID Device for Online Security
Banks Test ID Device for Online Security
Barbaras (mini-)rant
Barbaras (mini-)rant
Barcode Email
Barcode Email
Basic Question
Beginner's Pubkey Crypto Question
Behavior in undefined areas?
Benefits of PKI - 5,000 nodes organization
Best practice for TOD clock
big endian vs. little endian, why?
Binder REP Cards (Was: What's the linkage editor really wants?)
Binder REP Cards (Was: What's the linkage editor really wants?)
Binder REP Cards
Binder REP Cards (Was: What's the linkage editor really wants?)
Binder REP Cards
blast from the past ... macrocode
blast from the past, tcp/ip, project athena and kerberos
blast from the past on reliable communication
blast from the past on reliable communication
blast from the past on reliable communication
blast from the past on reliable communication
blast from the past on reliable communication
blast from the past on reliable communication
Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELY
Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELY
Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELY
Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELY
Blowing My Own Horn
Book on computer architecture for beginners
Book on computer architecture for beginners
Book on computer architecture for beginners
Book on computer architecture for beginners
Book on computer architecture for beginners
Brit banks introduce delays on interbank xfers due to phishing boom
Broken SSL domain name trust model
Broken SSL domain name trust model
Broken SSL domain name trust model
Broken SSL domain name trust model
browser vendors and CAs agreeing on high-assurance certificates
browser vendors and CAs agreeing on high-assurance certificates
browser vendors and CAs agreeing on high-assurance certificates
Cache coherency protocols: Write-update versus write-invalidate
Cache, TLB and OS
Cache, TLB and OS
Cache-Size vs Performance
Cache-Size vs Performance
Callable Wait State
Caller ID "spoofing"
Caller ID "spoofing"
Caller ID "spoofing"
Caller ID "spoofing"
Caller ID "spoofing"
Caller ID "spoofing"
Caller ID "spoofing"
Caller ID "spoofing"
Caller ID "spoofing"
Can anythink kill x86-64?
Canon Cat for Sale
capacity of largest drive
CAS and LL/SC
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
CAS and LL/SC
CAS and LL/SC
CAS and LL/SC
Case Study: Thunderbird's brittle security as proof of Iang's 3rd Hypothesis in secure design: there is only one mode, and it's secure
Case Study: Thunderbird's brittle security as proof of Iang's 3rd Hypothesis in secure design: there is only one mode, and it's secure
Case Study: Thunderbird's brittle security as proof of Iang's 3rd Hypothesis in secure design: there is only one mode, and it's secure
Catch22. If you cannot legally be forced to sign a document etc - Tax Declaration etc etc etc
Cerf and Kahn receive Turing award
Cerf and Kahn receive Turing award
Cerf and Kahn receive Turing award
Certificate Authority of a secured P2P network
Certificate Authority of a secured P2P network
Certificate Management Tools
Certificate Services
Change in computers as a hobbiest
Change in computers as a hobbiest
Change in computers as a hobbiest
Change in computers as a hobbiest
Changing the Mantra -- RFC 4732 on rethinking DOS
Channel Distances
Channel Distances
Channel Distances
Channel Distances
Channel Distances
Channel Distances
Charging Time
Charging Time
chip performance ... from long ago and far away
Chip-and-Pin terminals were replaced by "repairworkers"?
Chip-and-Pin terminals were replaced by "repairworkers"?
Chip-and-Pin terminals were replaced by "repairworkers"?
Chip-and-Pin terminals were replaced by "repairworkers"?
Citibank discloses private information to improve security
Citibank discloses private information to improve security
Citibank discloses private information to improve security
Citibank discloses private information to improve security
Citibank discloses private information to improve security
Citibank discloses private information to improve security
Citibank discloses private information to improve security
Citibank e-mail looks phishy
Citibank e-mail looks phishy
Citibank e-mail looks phishy
Citibank e-mail looks phishy
City National Bank is the latest major US company to admit it has lost customer data
CJ Date on Missing Information
CJ Date on Missing Information
Clearing sensitive in-memory data in perl
Clearing sensitive in-memory data in perl
Clearing sensitive in-memory data in perl
Cluster computing drawbacks
Cluster computing drawbacks
Cluster computing drawbacks
Cluster computing drawbacks
Cluster computing drawbacks
Cluster computing drawbacks
cluster-in-a-rack
clusters vs shared-memory (was: Re: CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE))
CMSBACK
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
Code density and performance?
cold war again
Collins C-8401 computer?
Comic Sans was Re: An alternative history
Command reference for VM/370 CMS Editor
Command reference for VM/370 CMS Editor
Communications Computers - Data communications over telegraph
comp.arch thread "intel's vanderpool and virtualization in general" ,,, fyi
computational model of transactions
Computer Artifacts
Computers in the movies
Computerworld Article: Dress for Success?
Computerworld Article: Dress for Success?
Computerworld Article: Dress for Success?
confidence in CA
confidence in CA
confidence in CA
Contactless payments and the security challenges
continuity of identity
Convering 2 Bytes of binary to BCD
Copy protection
Cost: Teletype 33 vs. IBM Selectric Terminal (2741?)
couple more Q's on basic public key encryption techniques
Course 2821; how this will help for CISSP exam?
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
CPU time and system load
CPU usage for paging
CRAM, DataCell, and 3850
CRAM, DataCell, and 3850
CRAM, DataCell, and 3850
CRAM, DataCell, and 3850
Cranky old computers still being used
Crash detection by OS
Crash detection by OS
Cray-1 Anniversary Event - September 21st
Cray-1 Anniversary Event - September 21st
creat
creat
Creating certs for others (without their private keys)
Creating certs for others (without their private keys)
Creativity and security
Creativity and security
Creativity and security
Creativity and security
CRJE and CRBE
Cross logins
Cross-Realm Authentication
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Crypto to defend chip IP: snake oil or good idea?
Curiosity
Curiousity: CPU % for COBOL program
Dangerous Hardware
Dangerous Hardware
Dangerous Hardware
Dangerous Hardware
Dangerous Hardware
Dangerous Hardware
Dangerous Hardware
Dangerous Hardware
Dangerous Hardware
DASD Response Time (on antique 3390?)
DASD Response Time (on antique 3390?)
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data communications over telegraph circuits
Data Encryption Standard Today
data integrity and logs
dbdebunk 'Quote of Week' comment
DCSS
DCSS
DCSS
dcss and page mapped filesystem
dcss and page mapped filesystem
DCSS as SWAP disk for z/Linux
DCSS as SWAP disk for z/Linux
DCSS as SWAP disk for z/Linux
DCSS as SWAP disk for z/Linux
DCSS as SWAP disk for z/Linux
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDA cards may address the UK Chip&Pin woes
DDJ Article on "Secure" Dongle
de-identification
Dealing with warning that certifcate can't be trusted?
Debit Cards HACKED now
Debit Cards HACKED now
Debit Cards HACKED now
Debit Cards HACKED now
Debit Cards HACKED now
Debit Cards HACKED now
DEC's Hudson fab
DEC's Hudson fab
DEC's Hudson fab
DEC's Hudson fab
DEC's Hudson fab
DEC's Hudson fab
DEC's Hudson fab
Decimal FP
Decimal FP
defeating firewalls made easy
Dell to Add Security Chip to PCs
Dell to Add Security Chip to PCs
derive key from password
Description of a new old-fashioned programming language
Descriptive term for reentrant program that nonetheless is
Design life of S/360 components?
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determining processor status without IPIs
Determinstic OpenSSL signature
Development as Configuration
Development as Configuration
Device and channel
Device and channel
Device and channel
Device and channel
Device and channel
Device Authentication - The answer to attacks lauched using stolen passwords?
Device Authentication - The answer to attacks lauched using stolen passwords?
Device Authentication - The answer to attacks lauched using stolen passwords?
Difference between server and workstation
Digital ID
Digital signature with Javascript
Digital signature with Javascript
Digital signature with Javascript
Digital signature with Javascript
Digital signatures have a big problem with meaning
Digital signatures have a big problem with meaning
Digital signatures have a big problem with meaning
Digital Singatures question
DMV systems?
DMV systems?
DMV systems?
DNS Name Caching
Do I need a certificat?
Do I need a certificat?
Do You Need a Digital ID?
Do You Need a Digital ID?
Do You Need a Digital ID?
Do You Need a Digital ID?
Do You Need a Digital ID?
Do You Need a Digital ID?
Documentation for the New Instructions for the z9 Processor
Does Public Key Authentication offer additional security over SSH/SFTP
Does Public Key Authentication offer additional security over SSH/SFTP
Does the Data Protection Act of 2005 Make Sense
DOS C prompt in "Vista"?
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
DOS/360: Forty years
Douglas Engelbart's HyperScope 1.0 Launched
Draft Command Script Processing Manual
Dual Core CPUs are slower than Dual Single core CPUs??
DUMP Datasets and SMS
DUMP Datasets and SMS
DUMP Datasets and SMS
Early microcomputer (esp i8008) software
EBCDIC to 6-bit and back
EBCDIC to 6-bit and back
Effective micropayments
Effi[ci]ency of branch table vs individual compare & branch
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)
Empires and Imperialism
EMV
encrypted tapes (was Re: Papers about "Algorithm hiding"?)
Encryption and authentication
Encryption Everywhere? (Was: Re: Ho boy! Another big one!)
Encryption Everywhere? (Was: Re: Ho boy! Another big one!)
Encryption for Powerpoint?
English (was Mainframe Limericks
EREP , sense ... manual
EREP , sense ... manual
ESCON to FICON conversion
Ethernet, Aloha and CSMA/CD -
Ethernet, Aloha and CSMA/CD -
Ethernet, Aloha and CSMA/CD -
Ethernet, Aloha and CSMA/CD -
EuroPKI 2005 - Call for Participation
EuroPKI 2005 - Call for Participation
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Exceptions at basic block boundaries
Executing both branches in advance?
Expanded Storage
Expanded Storage
Expanded Storage
Expanded Storage
Expanded Storage
expanding a password into many keys
expanding a password into many keys
Extended Validation - setting the minimum liability, the CA trap, the market in browser governance
Face and fingerprints swiped in Dutch biometric passport crack (another card skim vulnerability)
Factoring problem, solved
famous literature
Fast action games on System/360+?
Fast action games on System/360+?
Fast action games on System/360+?
Fast action games on System/360+?
Fast action games on System/360+?
FC++3 - Advances in Financial Cryptography, Number Three
feasibility of certificate based login (PKI) w/o real smart card
Federal Information Assurance Conference 2005, Oct 25-26
Federal Rules May Not Fully Secure Online Banking Sites
Fighting Fraudulent Transactions
File path formats
Filemode 7-9?
Filemode 7-9?
Filemode 7-9?
Filemode 7-9?
Firefox Lite, Mozilla Lite, Thunderbird Lite -- where to find
First assembly language encounters--how to get started?
First assembly language encounters--how to get started?
First assembly language encounters--how to get started?
Flat Query
Flat Query
Flat Query
Flat Query
Flat Query
Flat Query
Flat Query
Flaw exploited in RFID-enabled passports
Flaw in RFID-enabled passports (part 2?)
Foreign key in Oracle Sql
Foreign key in Oracle Sql
Foreign key in Oracle Sql
Foreign key in Oracle Sql
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
FraudWatch - Chip&Pin, a new tenner (USD10)
Fraudwatch - Chip&PIN one-sided story, banks and deception and liability shifts
Fraudwatch - Chip&PIN one-sided story, banks and deception and liability shifts
Fraudwatch - how much a Brit costs, how to be a 419-er, Sarbanes-Oxley rises as fraud rises, the real Piracy
Free to good home: IBM RT UNIX
Free to good home: IBM RT UNIX
Friday fun - Discovery on the pad and the software's not done
Friday question: How far back is PLO instruction supported?
Friday question: How far back is PLO instruction supported?
FULIST
FULIST
FULIST
FULIST
FULIST
FULIST
FULIST
FULIST
FULIST
garlic.com
garlic.com
Gartner: Stop Outsourcing Now
Gartner: Stop Outsourcing Now
Gen 2 EPC Protocol Approved as ISO 18000-6C
Gen 2 EPC Protocol Approved as ISO 18000-6C
Gen 2 EPC Protocol Approved as ISO 18000-6C
General PKI Question
Generalised approach to storing address details
GeoTrust says existing PKI practices are worthless
Globus/GSI versus Kerberos
Go-Back-N protocol?
Good passwords and security priorities
Good passwords and security priorities
Good System Architecture Sites?
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google Architecture
Google is full
Google launches search engine for finding source code
Gould, not Harris
GP4.3 - Growth and Fraud - Case #3 - Phishing
GP4.3 - Growth and Fraud - Case #3 - Phishing
GP4.3 - Growth and Fraud - Case #3 - Phishing
GP4.3 - Growth and Fraud - Case #3 - Phishing
GP4.3 - Growth and Fraud - Case #3 - Phishing
Graphics on the IBM 2260?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software Ever Written?
Greatest Software, System R
Greatest Software, System R
Greatest Software?
guess the date
Hackers steal AT&T customer data
Hadware Support for Protection Bits: what does it really mean?
Hadware Support for Protection Bits: what does it really mean?
Hamiltonian path as protection against DOS
Hamiltonian path as protection against DOS
Hamiltonian path as protection against DOS
hardware virtualization slower than software?
harris
Harvard Vs Von Neumann architecture
Hashes and Passwords
hashes on restricted domains: random functions or permutations?
hasp, jes, rasp, aspen, gold
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
HASP/ASP JES/JES2/JES3
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
He Who Thought He Knew Something About DASD
Health Care
Health Care
Health Care
Heating
help understand disk managment
help understand disk managment
Hercules 3.04 announcement
Hercules 3.04 announcement
Hercules 3.04 announcement
Hercules 3.04 announcement
Hercules 3.04 announcement
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hey! Keep Your Hands Out Of My Abstraction Layer!
Hi-tech no panacea for ID theft woes
Hi-tech no panacea for ID theft woes
Higher Education places still use mainframes?
Historical question, what went wrong with bubble memory?
Historical question, what went wrong with bubble memory?
History and definition of the term 'principal'?
History of performance counters
History of performance counters
History of performance counters
History of performance counters
History of performance counters
History of first use of all-computerized typesetting?
History of first use of all-computerized typesetting?
history of computing
history of computing
History of IBM Systems
History: How did Forth get its stacks?
How do you say "gnus"?
How do you get the chain of certificates & public keys securely
how do i encrypt outgoing email
How does this make you feel?
How does the internet really look like?
How good is TEA, REALLY?
How Many 360/195s and 370/195s were shipped?
How Many 360/195s and 370/195s were shipped?
How many wrongs do you need to make a right?
How many wrongs do you need to make a right?
How much RAM is 64K (36-bit) words of Core Memory?
How much RAM is 64K (36-bit) words of Core Memory?
how much swap size did you take?
How much for a DoD X.509 certificate?
How much for a DoD X.509 certificate?
how password is stored and check the authentication??
how password is stored and check the authentication??
How the Pentium Fell Short of a 360/195
How the Classical Scholars dropped security from the canon of Computer Science
How the Classical Scholars dropped security from the canon of Computer Science
How the Classical Scholars dropped security from the canon of Computer Science
How To Abandon Microsoft
How To Abandon Microsoft
How to restore VMFPLC dumped files on z/VM V5.1
How to restore VMFPLC dumped files on z/VM V5.1
How to restore VMFPLC dumped files on z/VM V5.1
How to implement Lpars within Linux
How to implement Lpars within Linux
I told you ... everybody is going to Dalian,China
IA64 and emulator performance
IA64 and emulator performance
IA64 and emulator performance
IBM 1130
IBM 3090/VM Humor
IBM 3090/VM Humor
IBM 3090/VM Humor
IBM 3330
IBM 3330
IBM 3380 and 3880 maintenance docs needed
IBM 360 channel assignments
IBM 360 channel assignments
IBM 360 channel assignments
IBM 5100 luggable computer with APL
IBM 5100 luggable computer with APL
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM 610 workstation computer
IBM Acronyms
IBM ATM machines
IBM microwave application--early data communications
IBM microwave application--early data communications
IBM microwave application--early data communications
IBM microwave application--early data communications
IBM Password fun
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM Plugs Big Iron to the College Crowd
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM sues maker of Intel-based Mainframe clones
IBM up for grabs?
IBM up for grabs?
IBM up for grabs?
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's mini computers--lack thereof
IBM's POWER6
IBM, UNIVAC/SPERRY, BURROUGHS, and friends. Compare?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
IBM/Watson autobiography--thoughts on?
ID "theft" -- so what?
ID "theft" -- so what?
ID "theft" -- so what?
ID theft ring proves difficult to stop
IDC: Virtual machines taking over the world
Identity and Access Management (IAM)
Identity Management Best Practices
Identity v. anonymity -- that is not the question
Identity v. anonymity -- that is not the question
IEH/IEB/... names?
IEH/IEB/... names?
IEH/IEB/... names?
Implementation of boolean types
Implementing schedulers in processor????
Importing CA certificate to smartcard
Impossible Database Design?
Improving 360 Addressing
Improving Authentication on the Internet
Improving Authentication on the Internet
Improving Authentication on the Internet
Improving Authentication on the Internet
Improving Authentication on the Internet
Improving Authentication on the Internet
Improving Authentication on the Internet
In Search of Stupidity
In Search of Stupidity
In Search of Stupidity
In Search of Stupidity
increasing addressable memory via paged memory?
increasing addressable memory via paged memory?
increasing addressable memory via paged memory?
Info on Compiler System 1 (Univac, Navy)?
Innovative password security
Innovative password security
Instruction Set Enhancement Idea
Intel abandons USEnet news
Intel abandons USEnet news
Intel abandons USEnet news
Intel engineer discusses their dual-core design
Intel engineer discusses their dual-core design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel strikes back with a parallel x86 design
Intel vPro Technology
Intel vPro Technology
Intel VPro
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general
intel's Vanderpool and virtualization in general (was Re: Cell press release, redacted.)
intel's Vanderpool and virtualization in general (was Re: Cell press release, redacted.)
Interesting bit of a quote
Interesting bit of a quote
Interesting bit of a quote
Interesting bit of a quote
Interesting bit of a quote
Interesting P4 pipeline article ("replay")
Internet today -- what's left for hobbiests
Internet today -- what's left for hobbiests
Internet today -- what's left for hobbiests
Internet today -- what's left for hobbiests
intersection between autolog command and cmsback (more history)
Introducing the new HavenCo location
IPCS Standard Print Service
IPSEC and user vs machine authentication
IPSEC wireless router?
IPSEC with non-domain Server
Is a cryptographic monoculture hurting us all?
is a computer like an airport?
Is a Hurricane about to hit IBM?
Is a Hurricane about to hit IBM?
Is Mondex secure?
Is no one reading the article?
Is no one reading the article?
Is Supercomputing Possible?
Is symmetric key distribution equivalent to symmetric key generation?
Is symmetric key distribution equivalent to symmetric key generation?
Is the solution FBA was Re: FW: Looking for Disk Calc
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is the teaching of non-reentrant HLASM coding practices ever defensible?
Is there any future for smartcards?
Is there any RFC for telnet proxy?
Is there a workaround for Thunderbird in a corporate environment?
Is there any future for smartcards?
Is there any future for smartcards?
Is this true? (Were gotos really *that* bad?)
Is this true? (Were gotos really *that* bad?)
Is this true? (Were gotos really *that* bad?)
Is this true? (Were gotos really *that* bad?)
Is VIO mandatory?
Is VIO mandatory?
Is VIO mandatory?
ISA vs. patent/trademark
ISA-independent programming language
ISA-independent programming language
It's official! SSH whips HTTPS butt! (in small minor test of no import....)
It's official: "nuke" infected Windows PCs instead of fixing them
It's official: "nuke" infected Windows PCs instead of fixing them
Jack Kilby dead
JES unification project
JIBC April 2006 - "Security Revisionism"
JIBC April 2006 - "Security Revisionism"
JIBC April 2006 - "Security Revisionism"
JIE - Contracts in Cyberspace
Job seperators
John Titor was right? IBM 5100
Kama Sutra Spoofs Digital Certificates
Keeping an eye on ATM fraud
Keeping score
Key exchange
Key pair & Certificate lifetimes
Key pair & Certificate lifetimes
Keylogger resistance
Keylogger resistance
keysigning: identity checks
Languages that should have made it but didn't
Large Computer Rescue
Large Computer Rescue
Large Computer Rescue
Latest news about mainframe
Latest news about mainframe
link-layer encryptors for Ethernet?
link-layer encryptors for Ethernet?
Linux - Our Saving Grace?
Linux mainframe game machine
Linux More Secure on System z?
Listserver for DFSMS/HSM
logical block addressing
Logon with Digital Siganture (PKI/OCES - or what else they're called)
long ago and far away, vm370 from early/mid 70s
long ago and far away, vm370 from early/mid 70s
long-term GPG signing key
long-term GPG signing key
long-term GPG signing key
Looking for Information on password systems
looking to buy a working DX box
Loss Expectancy in NPV calculations
Loss Expectancy in NPV calculations
Lynn at garlic.com
M.I.T. SNA study team
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Applications and Records Keeping?
Mainframe Jobs Going Away
Mainframe Jobs Going Away
Mainframe Limericks
Mainframe Limericks
Mainframe Limericks
Mainframe Limericks
Mainframe Limericks
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting (Was: Using Java in batch
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting (Was: Using Java in batch on
Mainframe Linux Mythbusting
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting
Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
Mainframe Linux Mythbusting
Mainframe near history (IBM 3380 and 3880 docs)
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Mainframe vs. xSeries
Major Browsers and CAS announce balkanisation of Internet Security
Making History
Markets in Imperfect Information - Lemons, Limes and Silver Bullets
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
massive data theft at MasterCard processor
Massive i/o
Massive i/o
Massive i/o
Massive i/o
Materiel and graft
Materiel and graft
Materiel and graft
Materiel and graft
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
Maximum RAM and ROM for smartcards
MB to Cyl Conversion
MB to Cyl Conversion
MCTS
MCTS
MCTS
MD5 collision in X509 certificates
MD5 collision in X509 certificates
MD5 for z/OS?
Meccano Trojans coming to a desktop near you
Meccano Trojans coming to a desktop near you
Meccano Trojans coming to a desktop near you
Meccano Trojans coming to a desktop near you
Meccano Trojans coming to a desktop near you
Meccano Trojans coming to a desktop near you
Memory Mapped I/O Vs I/O Mapped I/O
memory, 360 lcs, 3090 expanded store, etc
Metcalfe's Law Refuted
Metroliner telephone article
Metroliner telephone article
Metroliner telephone article
Metroliner telephone article
Mickey and friends
Microcomputers As A Space Spinoff
Microsoft - will they bungle the security game?
Microsoft to design its own CPUs - Next Xbox In Development
Microsoft to design its own CPUs - Next Xbox In Development
Microsoft to design its own CPUs - Next Xbox In Development
Military Time?
Military Time?
Military Time?
Military Time?
Military Time?
MIPS architecture question - Supervisor mode & who is using it?
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
Misuse of word "microcode"
mixing authentication and identification?
More Brittle Security -- Agriculture
More Brittle Security -- Agriculture
More on garbage collection
More on garbage
More on garbage
More on garbage
More on garbage collection
More on garbage
More on garbage
more on FBI plans new Net-tapping push
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
More Phishing scams, still no SSL being used
more secure communication over the network
more secure communication over the network
more secure communication over the network
more secure communication over the network
more than 16mbyte support for 370
Mount a tape
Mount a tape
Mount DASD as read-only
Mount DASD as read-only
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
Moving assembler programs above the line
moving on
moving on
moving on
moving on
Moz 1.8 performance dramatically improved
Moz 1.8 performance dramatically improved
Mozilla moves on security
Mozilla moves on security
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
Mozilla v Firefox
MTS, Emacs, and... WYLBUR?
MTS, Emacs, and... WYLBUR?
Multi-layered PKI implementation
Multicores
Multicores
Multicores
Multics on Vmware?
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
Multiple address spaces
multiple firefox with different profiles
Multiple mappings
Multiple mappings
Multiple mappings
Multiple mappings
Multiple mappings
Multiple mappings
Multiple mappings
Musings on a holiday weekend
Musings on a holiday weekend
Musings on a holiday weekend
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVCIN instruction
MVS secure configuration standard
MVS secure configuration standard
MVS secure configuration standard
Naked Payments IV - let's all go naked
Naked Payments IV - let's all go naked
Naked Payments IV - let's all go naked
Naked Payments IV - let's all go naked
Naked Payments IV - let's all go naked
Naked Payments IV - let's all go naked
Naked Payments IV - let's all go naked
Naked Payments IV - let's all go naked
Naked Payments II - uncovering alternates, merchants v. issuers, Brits bungle the risk, and just what are MBAs good for?
NASA Discovers Space Spies From the 60's
Need a HOW TO create a client certificate for partner access
Need Help defining an AS400 with an IP address to the mainframe
Network databases
Network databases
Network databases
Network databases
Network databases
Network databases
Network databases
Network databases
New airline security measures in Europe
New attacks on the financial PIN processing
New attacks on the financial PIN processing
New attacks on the financial PIN processing
New attacks on the financial PIN processing
New attacks on the financial PIN processing
New attacks on the financial PIN processing
New attacks on the financial PIN processing
New attacks on the financial PIN processing
new Enterprise Architecture online user group
New ISO standard aims to ensure the security of financial transactions on the Internet
NEW USA FFIES Guidance
NEW USA FFIES Guidance
Newisys Horus & AMD Opteron
News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
news group maintenance: SPEC CPU2006 announced
News Release
News Release
Newsgroups (Was Another OS/390 to z/OS 1.4 migration
Newsgroups (Was Another OS/390 to z/OS 1.4 migration
nntp and ssl
non ECC
Non Power of 2 Cache Sizes
Noobie SSL certificate problem
Not enough parallelism in programming
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Not Your Dad's Mainframe: Little Iron
Now the crackpots are trying to make it their own
NPR : E-Mail Encryption Rare in Everyday Use
NSA knows who you've called
NSA posts notice about faster, lighter crypto
NSFNET (long post warning)
Numa-Q Information
Numa-Q Information
Obsolete phrases
Obsolete phrases
Old Computers and Moisture don't mix - fairly OT
Old Computers and Moisture don't mix - fairly OT
Old Computers and Moisture don't mix - fairly OT
Old Computers and Moisture don't mix - fairly OT
old Gold/UTS reference
Old Hashing Routine
Old Hashing Routine
Old Hashing Routine
old hypervisor email
Old IBM protocol IBM 1006
Old PCs--environmental hazard
Old PCs--environmental hazard
Old PCs--environmental hazard
Old PCs--environmental hazard
Old PCs--environmental hazard
Old PCs--environmental hazard
old vm370 mitre benchmark
Oldest active information system
On Leadership - negotiating the RTFM into the realm of forgotten schoolyard jokes
On Leadership - negotiating the RTFM into the realm of forgotten schoolyard jokes
On Leadership - tech teams and the RTFM factor
On Leadership - tech teams and the RTFM factor
On sci.crypt: New attacks on the financial PIN processing
On sci.crypt: New attacks on the financial PIN processing
On sci.crypt: New attacks on the financial PIN processing
On smartcards and card readers
On the 370/165 and the 360/85
On-card displays
On-card displays
On-card displays
One more about SYRES Sharing
one more time now, Leading Cause of Data Security Breaches Are Due to Insiders, Not Outsiders
One or two CPUs - the pros & cons
One or two CPUs - the pros & cons
One or two CPUs - the pros & cons
One or two CPUs - the pros & cons
Online fraud 'ahead' of credit-card companies-experts
Online ID Thieves Exploit Lax ATM Security
oops
oops, cics
open-ssl-stream hangs on post
OpenSSL Hacks
OS's with loadable filesystem support?
OS's with loadable filesystem support?
OS/2 RIP
OSI - TCP/IP Relationships
OSI model and SSH, TCP, etc
OSI model and an interview
OSI model and an interview
OSI model and an interview
OSI model and an interview
OT - J B Hunt
OT - hand-held security
other cp/cms history
OTP (One-Time Pad Generator Program) and MD5 signature
Outsourcing
Outsourcing
Over my head in a JES exit
Over my head in a JES exit
Over my head in a JES exit
Over my head in a JES exit
Over my head in a JES exit
Over my head in a JES exit
Overweight truckers stopped by tech checks
P2P Authentication
P390
Pa Tpk spends $30 million for "Duet" system; but benefits are unknown
Pa Tpk spends $30 million for "Duet" system; but benefits are unknown
Pa Tpk spends $30 million for "Duet" system; but benefits are unknown
Page fault question (zero-filling)
Paranoia..Paranoia..Am I on the right track?.. any help please?
PART 3. Why it seems difficult to make an OOO VAX competitive
Password Complexity
Password Complexity
Password question
Password Requirements - VM:Secure
Password Requirements - VM:Secure
Passwords
Passwords for bank sites - change or not?
Passwords for bank sites - change or not?
Passwords for bank sites - change or not?
Passwords for bank sites - change or not?
Passwords for bank sites - change or not?
Patent #6886160
Patent buster for a method that increases password security
Patent buster for a method that increases password security
Patent buster for a method that increases password security
Patent buster for a method that increases password security
Patent buster for a method that increases password security
Patent buster for a method that increases password security
payment system fraud, etc
Payment systems - the explosion of 1995 is happening in 2006
Payment systems - the explosion of 1995 is happening in 2006
Payment Tokens
Payment Tokens
PCI audit compliance
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDP-1
PDS Directory Question
Pedantry (was RE: Shane's antipodes)
Penn Central RR computer system failure?
Penn Central RR computer system failure?
Penn Central RR computer system failure?
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance and Capacity Planning
Performance of zOS guest
Petrol firm suspends chip-and-pin
Petrol firm suspends chip-and-pin
Petrol firm suspends chip-and-pin
Petrol firm suspends chip-and-pin
Petrol firm suspends chip-and-pin
PGP "master keys"
PGP "master keys"
PGP "master keys"
PGP "master keys"
PGP "master keys"
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
PGP Lame question
Phishers Defeat 2-Factor Auth
Phishers now targetting SSL
phishing web sites using self-signed certs
phishing web sites using self-signed certs
phishing web sites using self-signed certs
phishing web sites using self-signed certs
Pick a pin
PKI
PKI
PKI Certificate question
PKI Crypto and VSAM RLS
PKI News
PKI News
PKI News
PKI too confusing to prevent phishing, part 28
PKI: the end
PKI: the end
PKI: the end
PKI: the end
PKI: the end
Plurals and language confusion
Power5 and Cell, new issue of IBM Journal of R&D
Power5 and Cell, new issue of IBM Journal of R&D
POWER6 on zSeries?
POWER6 on zSeries?
POWER6 on zSeries?
POWER6 on zSeries?
PowerPC or PARISC?
PowerPC or PARISC?
practical applications for synchronous and asynchronous communication
Privacy issue - how to spoof/hide IP when accessing email / usenet servers?
Privacy issue - how to spoof/hide IP when accessing email / usenet servers?
private key encryption - doubts
private key encryption - doubts
private key encryption - doubts
processors of the future: super-computer-on-a-chip?
Program execution speed
Protocol stack - disadvantages (revision)
Protocol stack - disadvantages (revision)
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
Public disclosure of discovered vulnerabilities
public key authentication
public key authentication
Public/Private key pair protection on Windows
PVM protocol documentation found
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
Qualified Certificate Request
Query on Load Balancer with SSL
Question about Dungeon game on the PDP
Question about authentication protocols
Radical z/OS
RAMAC 305(?)
Random Access Tape?
Random Access Tape?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
Ranking of non-IBM mainframe builders?
RCA Spectra 70/25: Another Mystery Computer?
real core
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
REAL memory column in SDSF
Really BIG disk platters?
Reasons for the big paradigm switch
Regarding interrupt sharing architectures!
Reliable Connections Are Not
Reliable Connections Are Not
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
Relocating application architecture and compiler support
remote support questions - curiousity
Remote Tape drives
REP cards
Repository for digital certificates
REPOST: Authentication, Authorization TO Firewall
REPOST: Authentication, Authorization TO Firewall
Request for comments - anti-phishing approach
Request for comments - anti-phishing approach
Reservation System Design
Resolver Issue (was Revolver Issue)
Revoking the Root
Revoking the Root
rexx or other macro processor on z/os?
RFC 2616 change proposal to increase speed
Robert Creasy, RIP
Root CA CRLs
RSA Adaptive Authentication
RSA SecurID product
RSA SecurID product
RSA SecurID product
RSA SecurID product
RSA SecurID product
RSA SecurID product
RSA SecurID product
RSA SecurID SID800 Token vulnerable by design
S/360
S/MIME Certificates from External CA
S0C1 with ILC 6
S0C1 with ILC 6
Safe to transmit (symmetric) key encrypted with itself?
Sarbanes-Oxley
Sarbanes-Oxley
Sarbanes-Oxley is what you get when you don't do FC
Sarbanes-Oxley is what you get when you don't do FC
Sarbanes-Oxley is what you get when you don't do FC
Sarbanes-Oxley is what you get when you don't do FC
SAT Reading and Math Scores Show Decline
SAT Reading and Math Scores Show Decline
SAT Reading and Math Scores Show Decline
SAT Reading and Math Scores Show Decline
SAT Reading and Math Scores Show Decline
SAT Reading and Math Scores Show Decline
SATA woes
sci.crypt
seamonkey default browser on fedora/kde?
Secure Banking
Secure design
Secure design
Secure design
Secure design
Secure design
Secure FTP on the Mainframe
secure payment method
Secure web page?
Securely handling credit card transactions earns Blackboard kudos
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing Private Key
Security
Security
Security
Security
Security as a "Consumer Choice" model or as a sales (SANS) model?
Security Implications of Using the Data Encryption Standard (DES)
Security of Secret Algorithm encruption
Security Soap Opera - (Central) banks don't (want to) know, MS prefers Brand X, airlines selling your identity, first transaction trojan
Security Soap Opera - (Central) banks don't (want to) know, MS prefers Brand X, airlines selling your identity, first transaction trojan
Security via hardware?
Security via hardware?
Security via hardware?
Security via hardware?
Security via hardware?
Seeking Info on XDS Sigma 7 APL
Seeking Info on XDS Sigma 7 APL
Seeking Info on XDS Sigma 7 APL
Seeking Info on XDS Sigma 7 APL
Seeking Info on XDS Sigma 7 APL
Seeking info on HP FOCUS (HP 9000 Series 500) and IBM ROMP CPUs from early 80's
Self restarting property of RTOS-How it works?
Self restarting property of RTOS-How it works?
Self restarting property of RTOS-How it works?
Sending CONSOLE/SYSLOG To Off-Mainframe Server
Separation of Roles - an example
SEQUENCE NUMBERS
serious threat models
SHA-1 code for IBM Mainframe
SHARE 50 years
SHARE 50 years?
SHARE attendance
SHARE reflections
shared memory programming on distributed memory model?
Shifting the Burden - legal tactics from the contracts world
should program call stack grow upward or downwards?
signing all outbound email
signing all outbound email
Signing and bundling data using certificates
simd for 390(or z990)?
simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
simple question about certificate chains
simple-minded historical "mips"
simple-minded historical "mips"
Single Password - Linux & Windows
Single Password - Linux & Windows
Single System Image questions
Single System Image questions
Single System Image questions
Single System Image questions
single-signon with X.509 certificates
Slow-Going For Next-Generation Threat-Scoring System
Smart cards and use the private key
smart cards with displays - at last!
Smart Cards?
Smartcard reader with certificate inside the reader
Smartcard reader with certificate inside the reader
Smartcard reader with certificate inside the reader
SNA/VTAM for NSFNET
So what's null then if it's not nothing?
So what's null then if it's not nothing?
Software for IBM 360/30
Software for IBM 360/30
Software for IBM 360/30 (was Re: DOS/360: Forty years)
Software for IBM 360/30
Software for IBM 360/30
Software for IBM 360/30
Software for IBM 360/30
solving the wrong problem
Some credible documented evidence that a MVS or later op sys has ever been hacked
Some questions on smart cards (Software licensing using smart cards)
some RDBMS history (x-over from comp.databases.theory)
Some thoughts on high-assurance certificates
Some thoughts on high-assurance certificates
some walk down history lane
something like a CTC on a PC
something like a CTC on a PC
something like a CTC on a PC
something like a CTC on a PC
something like a CTC on a PC
something like a CTC on a PC
sorting
sorting
sorting
sorting
sorting
sorting
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
sorting was: The System/360 Model 20 Wasn't As Bad As All That
Source maintenance was Re: SEQUENCE NUMBERS
Source maintenance was Re: SEQUENCE NUMBERS
Source maintenance was Re: SEQUENCE NUMBERS
sox, auditing, finding improprieties
Spoofing fingerprint scanners - NEWBIE()
Spring is here - that means Pressed Flowers
Sprint backs out of IBM outsourcing deal
SqlServerCE and SOA - an architecture question
ssh - password control or key control?
ssh - password control or key control?
SSL Certificate Signing
SSL security with server certificate compromised
SSL, Apache 2 and RSA key sizes
SSL, Apache 2 and RSA key sizes
stacks: sorting
stacks: sorting
Statistics on program constant sizes?
Status of Software Reuse?
Status of SRP
Status of opportunistic encryption
Status of opportunistic encryption
Status of opportunistic encryption
Status of SRP
Status of SRP
Status of opportunistic encryption
Status of opportunistic encryption
Status of SRP
Status of SRP
Steve Chen Making China's Supercomputer Grid
Stop Me If You've Heard This One Before
Stop Me If You've Heard This One Before
storage key question
Storage Philosophy Question
Storage Philosophy Question
stranger than fiction
Strobe equivalents
Successful remote AES key extraction
Supercomputers Cost
Supercomputers Cost
Symbols vs letters as passphrase?
System/360 Prototype
System/360 Prototype
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
System/360; Hardwired vs. Microcoded
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
Systems Programming for 8 Year-olds
Tapes (3590) and VM
Tax chooses dead language - Austalia
Tax chooses dead language - Austalia
Taxes
Taxes
Taxes
Taxes
TCP channel half closed
tcp-ip concept
tcp-ip concept
TCP/IP and connecting z to alternate platforms
TCPA compatible smarcard readers?
technical question about fingerprint usbkey
technical question about fingerprint usbkey
Tek 4010, info and prices
terminals was: Caller ID "spoofing"
The 8008
The 8008
The 8008
The 8008
The 8008
The 8008
The 8008
The 8008
The 8008 (was: Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELYwith slide rules)
The 8008
The 8008 (was: Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELYwith slide rules)
The 8008 (was: Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELYwith slide rules)
The 8008 (was: Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELYwith slide rules)
The 8008
The 8008
The AN/FSQ-31 Did Exist?!
The Chant of the Trolloc Hordes
The Chant of the Trolloc Hordes
The Chant of the Trolloc Hordes
The Chinese MD5 attack
The Chinese MD5 attack
The Chinese MD5 attack
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The Fate of VM - was: Re: Baby MVS???
The future of the Mainframe
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The Future of CPUs: What's After Multi-Core?
The History of Computer Role-Playing Games
The History of Computer Role-Playing Games
The Incredible Shrinking Cosmonaut Corps
The Incredible Shrinking Cosmonaut Corps
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
the limits of crypto and authentication
The Mac is like a modern day Betamax
The Mainframe and its future.. or furniture
The Mainframe and its future.. or furniture
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
The mid-seventies SHARE survey
the more things change, the more things stay the same
the more things change, the more things stay the same
the more things change, the more things stay the same
The new High Assurance SSL Certificates
The new High Assurance SSL Certificates
the new math: old battle of the sexes was: PDP-1
The not-so-little shop of 747s
THE on USS?
THE on USS?
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor
The Pankian Metaphor (redux)
the personal data theft pandemic continues
the personal data theft pandemic continues
the personal data theft pandemic continues
the personal data theft pandemic continues
The Power of the NORC
The Power of the NORC
The Question of Braces in APL-ASCII
the relational model of data objects *and* program objects
the relational model of data objects *and* program objects
the relational model of data objects *and* program objects
the relational model of data objects *and* program objects
The rise of the virtual machines
The SEL 840 computer
The Soul of Barb's New Machine
The Soul of Barb's New Machine
The Soul of Barb's New Machine (was Re: creat)
The Soul of Barb's New Machine (was Re: creat)
The Soul of Barb's New Machine (was Re: creat)
The summer of PKI love
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The System/360 Model 20 Wasn't As Bad As All That
The very first text editor
The very first text editor
The very first text editor
The very first text editor
The very first text editor
The very first text editor
The very first text editor
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
The Worth of Verisign's Brand
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
Thou shalt have no other gods before the ANSI C standard
thoughts on one time pads
thoughts on one time pads
thoughts on one time pads
thoughts on one time pads
thoughts on one time pads
thoughts on one time pads
threads versus task
threads versus task
threads versus task
Threatwatch - sigint by Hezbollah, nyms by torture units, closed source weaponry
ThreatWatch - markets in loss, Visa's take, 419 "chairmen"
Threatwatch - 2-factor tokens attacked by phishers
Three-Address RISC, and Really Fast Addressing
Title screen for HLA Adventure? Need help designing one
TLAs - was summit else entirely
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
TLS-certificates and interoperability-issues sendmail/Exchange/postfix
To live in interesting times - open Identity systems
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
To RISC or not to RISC
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD Clock the same as the BIOS clock in PCs?
TOD clock discussion
Today's mainframe--anything to new?
Today's mainframe--anything to new?
Today's mainframe--anything to new?
Today's mainframe--anything to new?
Token-ring vs Ethernet - 10 years later
Token-ring vs Ethernet - 10 years later
Token-ring vs Ethernet - 10 years later
Token-ring vs Ethernet - 10 years later
Top versus bottom posting was Re: IBM sues maker of Intel-based Mainframe clones
Top versus bottom posting was Re: IBM sues maker of Intel-based Mainframe clones
Toyota set to lift crown from GM
TPM & disk crypto
Track capacity?
Track capacity?
Track capacity?
Tracking you, tracking me, tracking everyone
transactional memory question
Transition of platforms in british education
Transition of platforms in british education
transputers again was Re: The demise of Commodore
transputers again was Re: The demise of Commodore
transputers again was Re: The demise of Commodore
transputers again was: The demise of Commodore
transputers again was: The demise of Commodore
transputers again was: The demise of Commodore
Trojan horse attack involving many major Israeli companies, executives
trusted certificates and trusted repositories
trusted certificates and trusted repositories
trusted repositories and trusted transactions
Trying to design low level hard disk manipulation program
Trying to design low level hard disk manipulation program
Trying to underdtand 2 factor authentication
Trying to design low level hard disk manipulation program
TSO and more was: PDP-1
TSO replacement?
TSO replacement?
TSO replacement?
TTP and KCM
TTP and KCM
Turbo C 1.5 (1987)
Turbo C 1.5 (1987)
Turbo C 1.5 (1987)
Turbo C 1.5 (1987)
Turbo C 1.5 (1987)
Turbo C 1.5 (1987)
Type A ,Type B
Type A ,Type B
UDP and IP Addresses
UK Banks Expected To Move To DDA EMV Cards
UK Detects Chip-And-PIN Security Flaw
UK Detects Chip-And-PIN Security Flaw
UK Detects Chip-And-PIN Security Flaw
UK EU presidency aims for Europe-wide biometric ID card
Ultra simple computing
UMA vs SMP? Clarification of terminology
UMA vs SMP? Clarification of terminology
Unforgeable Blinded Credentials
Universal constants
Universal constants
Universal constants
Universal constants
Universal constants: world wars
Uploading to Asimov
US consumers want companies fined for security breaches
Use of TPM chip for RNG?
Use of TPM chip for RNG?
Use of TPM chip for RNG?
User Authentication
User Authentication
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
using 3390 mod-9s
Using Corporate Logos to Beat ID Theft
Using different storage key's
Using smart cards for signing and authorization in applets
using ssl news servers
using ssl news servers
Using the Cache to Change the Width of Memory
Using the Cache to Change the Width of Memory
Using the Cache to Change the Width of Memory
Using the Cache to Change the Width of Memory
Using the Cache to Change the Width of Memory
Value of an old IBM PS/2 CL57 SX Laptop
Value of an old IBM PS/2 CL57 SX Laptop
Value of an old IBM PS/2 CL57 SX Laptop
Value of an old IBM PS/2 CL57 SX Laptop
Value of an old IBM PS/2 CL57 SX Laptop
Value of an old IBM PS/2 CL57 SX Laptop
Value of an old IBM PS/2 CL57 SX Laptop
Value of an old IBM PS/2 CL57 SX Laptop
Value of an old IBM PS/2 CL57 SX Laptop
Various kinds of System reloads
Various kinds of System reloads
Various kinds of System reloads
VAXen with switchmode power supplies?
Very slow booting and running and brain-dead OS's?
Very slow booting and running and brain-dead OS's?
Very slow booting and running and brain-dead OS's?
Very slow booting and running and brain-dead OS's?
Very slow booting and running and brain-dead OS's?
virtual 360/67 support in cp67
virtual 360/67 support in cp67
virtual 360/67 support in cp67
virtual 360/67 support in cp67
Virtual Machine Hardware
Virtual Machine Hardware
Virtual Machine Hardware
Virtual Machine Hardware
Virtual memory and memory protection
virtual memory
Virtual memory implementation in S/370
Virtual memory implementation in S/370
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
virtual memory
Virtual Virtualizers
Virtual Virtualizers
Virtual Virtualizers
virtualization?
VM maclib reference
VM SPOOL question
VM SPOOL question
VM tape definitions
VMFPLC2 to load EREP PTFs
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
vmshare
Volume Largest Free Space Problem...???
Von Neumann machines. The key to space and much else
Votes are coins stamped with the Red Queen's head
Votes are coins stamped with the Red Queen's head
Vulnerability Assessment of a EAL 4 system
waiting for acknowledgements
waiting for acknowledgements
waiting for acknowledgements
Wanted: info on old Unisys boxen
Wanted: info on old Unisys boxen
Wars and Allies
was change headers: The Fate of VM - was: Re: Baby MVS???
was change headers: The Fate of VM - was: Re: Baby MVS???
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
Was FORTRAN buggy?
WESII - Programme - Economics of Securing the Information Infrastructure
What are the latest topic in TCP/IP
What data is encoded?
What does a patent do that copyright does not?
What does a patent do that copyright does not?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What ever happened to Tandem and NonStop OS?
What happened with the session fixation bug?
What happened with the session fixation bug?
What happens if CR's are directly changed?
What is the "name" of a system?
What is a Certificate?
What is a Certificate?
What is a Certificate?
What is a Certificate?
What is a Certificate?
What is a Certificate?
What is CRJE
What is written on the keys of an ICL Hand Card Punch?
What is the point of encrypting information that is publicly visible?
What is the point of encrypting information that is publicly visible?
What part of z/OS is the OS?
What part of z/OS is the OS?
What part of z/OS is the OS?
What part of z/OS is the OS?
What part of z/OS is the OS?
What was new&important in computer architecture 10 years ago?
What was new&important in computer architecture 10 years ago?
What was new&important in computer architecture 10 years ago?
What's a mainframe?
What's a mainframe?
What's a mainframe?
What's a mainframe?
What's a mainframe?
What's a mainframe?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF(Line Fee) and NL (New line)?
what's the difference between LF (Line Fee) and NL (New line)?
What's The Best Computer and Why
What's The Best Computer and Why
whats the difference between Encryption and Encoding? or both are same?
wheeler scheduler and hpo
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When *not* to sign an e-mail message?
When did computers start being EVIL???
When Does Folklore Begin???
When Does Folklore Begin???
When Does Folklore Begin???
When Does Folklore Begin???
When Does Folklore Begin???
When Does Folklore Begin???
When Does Folklore Begin???
Where can you get a Minor in Mainframe?
Where can you get a Minor in Mainframe?
Where can you get a Minor in Mainframe?
Where can you get a Minor in Mainframe?
where do I buy a SSL certificate?
where do I buy a SSL certificate?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be?
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be?
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be: in tags and descriptors
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Where should the type information be?
Which certification authority to use
Which entry of the routing table was selected?
Who has a Core Competency in Security?
Who has a Core Competency in Security?
Who has a Core Competency in Security?
Who has a Core Competency in Security?
Who has a Core Competency in Security?
Who has a Core Competency in Security?
who invented CONFIG/SYS?
whole load of new RFCs announced yesterday on LDAP and SASL
Why are smart cards so dumb?
Why are smart cards so dumb?
Why are smart cards so dumb?
Why are smart cards so dumb?
Why Blockbuster looks at your ID
Why Blockbuster looks at your ID
Why Did No Core Machines Have Cache???
Why Didn't The Cent Sign or the Exclamation Mark Print?
Why Didn't The Cent Sign or the Exclamation Mark Print?
Why does my address appear as part of my name?
Why I use a Mac, anno 2006
Why I use a Mac, anno 2006
Why I use a Mac, anno 2006
Why I use a Mac, anno 2006
Why I use a Mac, anno 2006
Why I use a Mac, anno 2006
Why is zSeries so CPU poor?
Why is z series so CPU poor?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why magnetic drums was/are worse than disks?
Why no double wide compare and swap on Sparc?
Why no double wide compare and swap on Sparc?
Why not 2048 or 4096 bit RSA key issuance?
Why not 2048 or 4096 bit RSA key issuance?
Why not 2048 or 4096 bit RSA key issuance?
Why not 2048 or 4096 bit RSA key issuance?
Why not 2048 or 4096 bit RSA key issuance?
Why security training is really important (and it ain't anything to do with security!)
Why security training is really important (and it ain't anything to do with security!)
Why security training is really important (and it ain't anything to do with security!)
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why so little parallelism?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?; Now : Programming practices
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?; Now : Programming practices
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why these original FORTRAN quirks?
Why? (Was: US Military Dead during Iraq War
Why? (Was: US Military Dead during Iraq War
Why? (Was: US Military Dead during Iraq War
Why? (Was: US Military Dead during Iraq War
Why? (Was: US Military Dead during Iraq War
Wildcard SSL Certificates
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
winscape?
Wonder why IBM code quality is suffering?
Worried about your online privacy?
Would multi-core replace SMPs?
Would multi-core replace SMPs?
Would multi-core replace SMPs?
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 / PKI, PGP, and IBE Secure Email Technologies
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X.509 and ssh
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X509 digital certificate for offline solution
X68-64 buffer overflow exploits and the borrowed code chunks exploitation technique
X68-64 buffer overflow exploits and the borrowed code chunks exploitation technique
X68-64 buffer overflow exploits and the borrowed code chunks exploitation technique
XBOX 360
XML Encryption
xml-security vs. native security
xml-security vs. native security
xml-security vs. native security
xml-security vs. native security
xml-security vs. native security
XOR passphrase with a constant
Year-end computer bug could ground Shuttle
Year-end computer bug could ground Shuttle
Year-end computer bug could ground Shuttle
Year-end computer bug could ground Shuttle
Year-end computer bug could ground Shuttle
Year-end computer bug could ground Shuttle
You might be a mainframer if... :-) V3.8
Your data private? Access all areas is on the cards
Your Mother Saves Data on Eight-Track Tapes
Z/Os Storage Mgmt products
z/VM Listserv?
z/VM Listserv?
z/VM performance
Zeroing core

back to top, network, mainframe, digsig, all - (2009- ) - (2007-2008) - (2005-2006) - (2003-2004) - (2001-2002) - (1993-2000)